Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe
Resource
win10v2004-20240802-en
General
-
Target
3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe
-
Size
53KB
-
MD5
8547ae030dd47cdfb5c07e3156679620
-
SHA1
fde8f6b7cb39fd3b2472243b46bf01047d963fdf
-
SHA256
3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34
-
SHA512
c28027d5bdf8fa62265d1cee561337439c60a8ee899b1baac4495561052ded431e5c842fbed6e2816e608be353dcb5281d0a4352aa7b72e787b1aa8bd65fefa3
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIk:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYV2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 280 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 280 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 280 1864 3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe 30 PID 1864 wrote to memory of 280 1864 3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe 30 PID 1864 wrote to memory of 280 1864 3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe 30 PID 1864 wrote to memory of 280 1864 3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe"C:\Users\Admin\AppData\Local\Temp\3a277bb12fb6b31a191b3e71a31c57e29775cb462fb265948dac610b8d217a34N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD53e25c4391c591a4059801ea2ad189c07
SHA140b09549c2a1ed00c83c6a5e074b06ae6a250d81
SHA256b16f36975c102e02bc3d7c0ad354a9c6defa820468ade4e0c246c6ba13c14235
SHA51284d2b83391b82cceab3a08c46ff7823ecda02daae58457f8365f0f437f9de5ae8404ef5ff378489041d0c712a8308ae46b7f934e64449489cc041e8d5951b41f